3 Ways to Protect the IBM i from Ransomware Attacks — Joe Hertvik & Mel Zucker

Although ransomware doesn’t attack the IBM i operating system or native DB2 libraries, it can encrypt and rename Integrated File System (IFS) stream files that support native IBM i applications and store user documents.   

Ransomware attacks can disable critical IBM i processing by damaging IFS-based configuration settings and data files. Ransomware disables business processing, breaches security, and wastes money and time in recovering from an attack.   

Recent ransomware events have increased the probability your IFS will be attacked, as ransomware attacks have become more prevalent. Corporations, governments, auditors and regulators are increasingly requiring stronger protection against ransomware attacks.

Join this webinar where we’ll discuss how ransomware attacks the IBM i IFS, steps you can take to protect against ransomware and how to respond when you’re attacked. You’ll learn:  

• How ransomware attacks IFS stream files

• Critical IBM i security settings that protect your IFS from ransomware

• Recovery techniques and best practices to consider when an attack occurs

• Preventing, stopping, and isolating IBM i ransomware activity in real-time

Mel Zucker

Senior IBM i Solutions Engineer, Software Engineering of America

Mel Zucker has been a Senior IBM i Solutions Engineer with Software Engineering of America for the past 9 years. Prior to joining SEA, Mel was a member of the IBM team supporting their line of midrange products for over 30 years. While at IBM, Mel was the recipient of multiple IBM Means Service and System Engineering Achievement awards.

Key:

Complete
Failed
Available
Locked
Video
Open to view video.
Open to view video.